Vectra and Microsoft join forces to step up detection and response

Credit to Author: Jim Flack| Date: Mon, 21 Sep 2020 16:00:17 +0000

SOCs combine NDR visibility with EDR insight, couples them with analytics from sources in the SIEM to detect and stop attacks evading perimeter defenses.

The post Vectra and Microsoft join forces to step up detection and response appeared first on Microsoft Security.

Read more

Industry-wide partnership on threat-informed defense improves security for all

Credit to Author: Eric Avena| Date: Wed, 16 Sep 2020 16:00:39 +0000

MITRE Engenuity’s Center for Threat-Informed Defense has published a library of detailed plans for emulating the threat actor FIN6 (which Microsoft tracks as TAAL). Microsoft is proud to be part of this industry-wide collaborative project.

The post Industry-wide partnership on threat-informed defense improves security for all appeared first on Microsoft Security.

Read more

Microsoft announces new Project OneFuzz framework, an open source developer tool to find and fix bugs at scale

Credit to Author: Jim Flack| Date: Tue, 15 Sep 2020 16:00:22 +0000

We’re excited to release a new tool called OneFuzz, an extensible fuzz testing framework for Azure.

The post Microsoft announces new Project OneFuzz framework, an open source developer tool to find and fix bugs at scale appeared first on Microsoft Security.

Read more

Microsoft Security: Use baseline default tools to accelerate your security career

Credit to Author: Jim Flack| Date: Mon, 14 Sep 2020 16:00:05 +0000

As you build your cybersecurity career, take advantage of important new and proactive security configuration and management capabilities that will help your organization ‘move left’ on understanding and reducing risk.

The post Microsoft Security: Use baseline default tools to accelerate your security career appeared first on Microsoft Security.

Read more

STRONTIUM: Detecting new patterns in credential harvesting

Credit to Author: Jim Flack| Date: Thu, 10 Sep 2020 18:45:52 +0000

Microsoft has tied STRONTIUM to a newly uncovered pattern of Office365 credential harvesting activity aimed at US and UK organizations directly involved in political elections.

The post STRONTIUM: Detecting new patterns in credential harvesting appeared first on Microsoft Security.

Read more

SMB cybersecurity posture weakened by COVID-19, Labs report finds

Credit to Author: David Ruiz| Date: Fri, 04 Sep 2020 15:00:00 +0000

In parsing the data for our August report on COVID-19, we learned that SMB cybersecurity faced many challenges, some of which are being unaddressed.

Categories:

Tags:

(Read more…)

The post SMB cybersecurity posture weakened by COVID-19, Labs report finds appeared first on Malwarebytes Labs.

Read more

Force firmware code to be measured and attested by Secure Launch on Windows 10

Credit to Author: Eric Avena| Date: Tue, 01 Sep 2020 16:00:54 +0000

For important security features on Windows to properly do their jobs, the platform’s firmware and hardware must be trustworthy and healthy. Learn about Secure Launch, which leverages the principle of Dynamic Root of Trust for Measurement (DRTM), and System Management Mode (SMM) protection.

The post Force firmware code to be measured and attested by Secure Launch on Windows 10 appeared first on Microsoft Security.

Read more